2008
DOI: 10.1109/mcom.2008.4473092
|View full text |Cite
|
Sign up to set email alerts
|

Defense of trust management vulnerabilities in distributed networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
139
0

Year Published

2011
2011
2016
2016

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 231 publications
(139 citation statements)
references
References 5 publications
0
139
0
Order By: Relevance
“…According to [16], there are 3 main categories of trust evaluation models: predictive models [21,20,25], transactional models [12,20,27] and, mechanism design based models [13,36]. Predictive models have a sub-category of models using witness's information in order to increase accuracy of their trust measurement.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…According to [16], there are 3 main categories of trust evaluation models: predictive models [21,20,25], transactional models [12,20,27] and, mechanism design based models [13,36]. Predictive models have a sub-category of models using witness's information in order to increase accuracy of their trust measurement.…”
Section: Related Workmentioning
confidence: 99%
“…These models are worthy to be discussed in terms of their attempt to address the trust establishment in a different perspective. Predictive models also address the security establishment of the network of active agents [9,19,25]. In [9], an approach based on interpreted functions has been proposed to alow an agent to estimate the security level of message components that he receives so that he can handle them correctly.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…A trust management framework could be subjected to other types of security attacks [2,15,12]. For example, bad mouthing attack, in which dishonest recommendations are provided by nodes, on-off attack, in which nodes behave well and badly alternatively, conflicting behavior attack, in which nodes behave differently with different peer nodes, sybil attack, in which several fake identifiers are created by a node and newcomer attack, in which a node registers itself as a new user.…”
Section: Related Workmentioning
confidence: 99%